Skip to content

kinerno/overload

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

36 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ“‘ DoS Tool

Discord Server

πŸ’» Preview

πŸŒ™ Installation

Windows


Download Python 3.10 here, open the installer and click on add python to PATH. Next, download overload here and open CMD or PowerShell in its directory. Now you need to create a Virtual Enviroment for the application; if you have make utility on your system just execute:

make setup
make run

If you don't have it, then execute:

curl -sSL https://install.python-poetry.org | python3
poetry install --without dev
poetry run python3 overload.py


Linux


sudo apt update
sudo apt install python3 git -y
git clone https://github.com/7zx/overload
cd overload/

make setup
make run


Termux


pkg update
pkg install python3 git -y

git clone https://github.com/7zx/overload
cd overload/

pip install -r requirements.txt
python3 overload.py


❔ How To Use


Once the application has been opened, choose the attack method, for how long the attack will take over (in seconds), how many threads will attack the target, the sleep time of the sockets (Slowloris only), and the target itself.

HTTP GET Attack Example:

β”œβ”€β”€β”€ DOS TOOL
β”œβ”€β”€β”€ AVAILABLE METHODS
β”œβ”€β”€β”€ LAYER 7: HTTP | HTTP-PROXY | SLOWLORIS | SLOWLORIS-PROXY
β”‚   β”œβ”€β”€β”€METHOD: HTTP
β”‚   β”œβ”€β”€β”€TIME: 600
β”‚   β”œβ”€β”€β”€THREADS: 800
β”‚   └───URL: https://github.com/7zx/overload

Slowloris Attack Example:

...
β”‚   β”œβ”€β”€β”€METHOD: SLOWLORIS
β”‚   β”œβ”€β”€β”€TIME: 300
β”‚   β”œβ”€β”€β”€THREADS: 200
β”‚   β”œβ”€β”€β”€SLEEP TIME: 15
β”‚   └───URL: https://github.com/7zx/overload

Overload can also perform an L4 attack (SYN-FLOOD) if you're running it on a Posix system:

...
β”œβ”€β”€β”€ LAYER 4: SYN-FLOOD
β”‚   β”œβ”€β”€β”€METHOD: SYN-FLOOD
β”‚   β”œβ”€β”€β”€TIME: 40
β”‚   β”œβ”€β”€β”€THREADS: 10
β”‚   └───URL: 192.168.0.1

If the method uses proxy, then the threads will initialize and connect to elite-anonymity public proxies, and if not, your IP will be used on the requests. We do not own the proxy servers and do not respond for anything that they may do (like leaking your actual IP); they are hosted by volunteers and their addresses are retrieved through the Proxy Scrape API.



⚠ Disclaimer


This application is intended to be used as a testing tool against your own servers. DO NOT USE IT TO ATTACK OTHER PEOPLE, we don't take responsibility for anything that may come up if you attack someone else. Also, this project makes a DoS attack, if you want to take down well-hosted servers, then it's up to you to scale the attack using a DDoS approach. Know the limitations of what you can do, and the defense mechanism used by your target; for instance, if a webserver uses DDoS mitigation appliances (such as load balancing), then you'll probably fail to take it down; a router that implements SYN Cookies will not be affected by a SYN-Flood attack, and so on.

About

πŸ“‘ Overload DoS Tool (Layer 7)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 96.6%
  • Makefile 3.4%